New Authentication Algorithm Based on Verifiable Encryption with Digital Identity

被引:2
|
作者
Kihara, Maki [1 ]
Iriyama, Satoshi [1 ]
机构
[1] Tokyo Univ Sci, Dept Informat Sci, Yamazaki 2641, Noda, Chiba 2788510, Japan
关键词
internet of things; authentication; identification; verifiable encryption; cryptography;
D O I
10.3390/cryptography3030019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new authentication algorithm for small internet of things (IoT) devices without key distribution and secure servers. Encrypted private data are stored on the cloud server in the registration step and compared with incoming encrypted data without decryption in the verification step. We call a set of encryptions that can verify two encrypted data items without decryption a verifiable encryption (VE). In this paper, we define VE, and claim that several cryptosystems belong to the VE class. Moreover, we introduce an authentication algorithm based on VE, and show an example of the algorithm and discuss its performance and security. As the algorithm neither shares any secret keys nor decrypts, its computation time becomes very small.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [1] Security Verification of an Authentication Algorithm Based on Verifiable Encryption
    Kihara, Maki
    Iriyama, Satoshi
    [J]. INFORMATION, 2023, 14 (02)
  • [2] Research on Digital Encryption Security Information System Based on Identity Authentication
    Bu, Xu
    [J]. PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ECONOMIC DEVELOPMENT AND EDUCATION MANAGEMENT (ICEDEM 2018), 2018, 290 : 175 - 178
  • [3] Identity-Based Encryption with Verifiable Outsourced Revocation
    Ren, Yanli
    Ding, Ning
    Zhang, Xinpeng
    Lu, Haining
    Gu, Dawu
    [J]. COMPUTER JOURNAL, 2016, 59 (11): : 1659 - 1668
  • [4] A Novel Authentication Scheme Based on Verifiable Credentials Using Digital Identity in the Context of Web 3.0
    Nita, Stefania Loredana
    Mihailescu, Marius Iulian
    [J]. ELECTRONICS, 2024, 13 (06)
  • [5] SVD-based image compression, encryption, and identity authentication algorithm on cloud
    Yu, Changzhi
    Li, Hengjian
    Wang, Xiyu
    [J]. IET IMAGE PROCESSING, 2019, 13 (12) : 2224 - 2232
  • [6] The Design and Implementation of the Wireless Network Identity Authentication System based on the Hybrid Encryption Algorithm
    Xu, Yongbing
    Wang, Junyi
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 303 - 306
  • [7] A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption
    Li, Xinyan
    Xiao, Di
    Mou, Huajian
    Lu, Dianjun
    Peng, Mei
    [J]. IEEE ACCESS, 2020, 8 : 211676 - 211690
  • [8] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    [J]. TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298
  • [9] Verifiable Security of Boneh-Franklin Identity-Based Encryption
    Barthe, Gilles
    Olmedo, Federico
    Zanella Beguelin, Santiago
    [J]. PROVABLE SECURITY, 2011, 6980 : 68 - 83
  • [10] A threshold identity-based encryption from the verifiable random function
    Wu, Qing
    Kang, Hongbo
    [J]. Journal of Computational Information Systems, 2011, 7 (16): : 5908 - 5915